Overview
overview
10Static
static
341c38b28a9...18.exe
windows7-x64
1041c38b28a9...18.exe
windows10-2004-x64
10$1/Outbrea...39.exe
windows7-x64
9$1/Outbrea...39.exe
windows10-2004-x64
9$1/Softwar...95.exe
windows7-x64
10$1/Softwar...95.exe
windows10-2004-x64
10$1/Softwar...84.exe
windows7-x64
9$1/Softwar...84.exe
windows10-2004-x64
9$1/Softwar...re.exe
windows7-x64
$1/Softwar...re.exe
windows10-2004-x64
$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 14:05
Static task
static1
Behavioral task
behavioral1
Sample
41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$1/Outbreak/Pigeon_39.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$1/Outbreak/Pigeon_39.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$1/Software/Crew_95.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$1/Software/Crew_95.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$1/Software/Glad_84.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$1/Software/Glad_84.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$1/Software/software.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$1/Software/software.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
General
-
Target
$1/Software/Glad_84.exe
-
Size
4.5MB
-
MD5
0881095412775a91dcaab9b0ff5325e4
-
SHA1
6b8001b963c6120ebfbc303f9d9e42eb7b935dba
-
SHA256
a801f1c92530887b30c21fcd5fbfe284446a918441a9ba62bb98ff23772e470d
-
SHA512
0111e64ef2b1b133f0da60e2e9885a4bc65f4c5f43cc01abe664cc4ff9202f94fc581943b27fd967076ae9d3ebe965a0a0c06842d725649bc8536f7c4d8ff521
-
SSDEEP
98304:ViaFZ3PhLv71Y0e76VOqPJonYVvXCo2MahOY/FYkloKVUcNW9nTBqTTbm6EHo:ViaFZfdv60dVOpna/GFbKrcNWNBqTTb1
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Glad_84.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Glad_84.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Glad_84.exe -
Deletes itself 1 IoCs
pid Process 2280 cmd.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine Glad_84.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral7/memory/1568-3-0x0000000000D50000-0x00000000017C7000-memory.dmp autoit_exe behavioral7/memory/1568-4-0x0000000000D50000-0x00000000017C7000-memory.dmp autoit_exe behavioral7/memory/1568-9-0x0000000000D50000-0x00000000017C7000-memory.dmp autoit_exe behavioral7/memory/1568-13-0x0000000000D50000-0x00000000017C7000-memory.dmp autoit_exe behavioral7/memory/1568-15-0x0000000000D50000-0x00000000017C7000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1568 Glad_84.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1616 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1568 Glad_84.exe 1568 Glad_84.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1568 Glad_84.exe 1568 Glad_84.exe 1568 Glad_84.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1568 Glad_84.exe 1568 Glad_84.exe 1568 Glad_84.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2844 1568 Glad_84.exe 31 PID 1568 wrote to memory of 2844 1568 Glad_84.exe 31 PID 1568 wrote to memory of 2844 1568 Glad_84.exe 31 PID 1568 wrote to memory of 2844 1568 Glad_84.exe 31 PID 1568 wrote to memory of 320 1568 Glad_84.exe 33 PID 1568 wrote to memory of 320 1568 Glad_84.exe 33 PID 1568 wrote to memory of 320 1568 Glad_84.exe 33 PID 1568 wrote to memory of 320 1568 Glad_84.exe 33 PID 1568 wrote to memory of 1780 1568 Glad_84.exe 35 PID 1568 wrote to memory of 1780 1568 Glad_84.exe 35 PID 1568 wrote to memory of 1780 1568 Glad_84.exe 35 PID 1568 wrote to memory of 1780 1568 Glad_84.exe 35 PID 1568 wrote to memory of 2280 1568 Glad_84.exe 37 PID 1568 wrote to memory of 2280 1568 Glad_84.exe 37 PID 1568 wrote to memory of 2280 1568 Glad_84.exe 37 PID 1568 wrote to memory of 2280 1568 Glad_84.exe 37 PID 2280 wrote to memory of 1616 2280 cmd.exe 39 PID 2280 wrote to memory of 1616 2280 cmd.exe 39 PID 2280 wrote to memory of 1616 2280 cmd.exe 39 PID 2280 wrote to memory of 1616 2280 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\$1\Software\Glad_84.exe"C:\Users\Admin\AppData\Local\Temp\$1\Software\Glad_84.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc install MicrosoftDefenderBackup C:\ProgramData\Microsoft\MicrosoftDefender\WUDHost.exe2⤵PID:2844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc start MicrosoftDefenderBackup2⤵PID:320
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc set MicrosoftDefenderBackup start SERVICE_AUTO_START && mwc start MicrosoftDefenderBackup2⤵PID:1780
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 5 localhost < nul & del /F /Q "C:\Users\Admin\AppData\Local\Temp\$1\Software\Glad_84.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost3⤵
- Runs ping.exe
PID:1616
-
-